Category: HelpnetSecurity

Data Theorem enhances Cloud Secure platform with ML-based hacker toolkits and visualizations
24
Oct
2023

Data Theorem enhances Cloud Secure platform with ML-based hacker toolkits and visualizations

Data Theorem introduced an attack path analysis of APIs and software supply chain exploits to its cloud-native application protection platform…

1Password also affected by Okta Support System breach
24
Oct
2023

1Password also affected by Okta Support System breach

Following in the footsteps of BeyondTrust and CloudFlare, 1Password has revealed that it has been affected by the Okta Support…

Bracing for AI-enabled ransomware and cyber extortion attacks
24
Oct
2023

Bracing for AI-enabled ransomware and cyber extortion attacks

AI has been the shiniest thing in tech since at least November 2022, when ChatGPT was made available to the…

Wazuh: Free and open-source XDR and SIEM
24
Oct
2023

Wazuh: Free and open-source XDR and SIEM

Wazuh is an open-source platform designed for threat detection, prevention, and response. It can safeguard workloads in on-premises, virtual, container,…

The primary pain points for SOC teams
24
Oct
2023

The primary pain points for SOC teams

Security professionals want to pursue high-impact work, but they’re being held back by growing workloads, shrinking budgets, and a worsening…

Today’s CIO has ambitions well beyond IT delivery
24
Oct
2023

Today’s CIO has ambitions well beyond IT delivery

45% of CIOs are beginning to work with their CxO peers to bring IT and business area staff together to…

Microsoft announces wider availability of AI-powered Security Copilot
23
Oct
2023

Microsoft announces wider availability of AI-powered Security Copilot

Microsoft Security Copilot has been made available to a larger number of enterprise customers, via an invitation-only Early Access Program….

Unit21 Real-Time Monitoring empowers users to identify potential fraud
23
Oct
2023

Unit21 Real-Time Monitoring empowers users to identify potential fraud

Unit21 launches Real-Time Monitoring to fight real-time fraud and transform the landscape of risk management. With Real-Time Monitoring, fraud prevention…

How passkeys are changing the face of authentication
23
Oct
2023

How passkeys are changing the face of authentication

As passwordless identity becomes mainstream, the term “passkey” is quickly becoming a new buzzword in cybersecurity. But what exactly is…

Scaling rapidly? Your application security strategies need to keep up
23
Oct
2023

Scaling rapidly? Your application security strategies need to keep up

Modern application security strategies must support and enable modern software development, even as it rapidly scales, according to Mend.io. Just…

Only a fraction of risk leaders are prepared for GenAI threats
23
Oct
2023

Only a fraction of risk leaders are prepared for GenAI threats

While 93% of companies recognize the risks associated with using generative AI inside the enterprise, only 9% say they’re prepared…

Week in review: Cybersecurity cheat sheets, widely exploited Cisco zero-day, KeePass-themed malvertising
22
Oct
2023

Week in review: Cybersecurity cheat sheets, widely exploited Cisco zero-day, KeePass-themed malvertising

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: North Korean hackers are targeting…